Walls have ears! opportunistically communicating secret messages over the wiretap channel: From theory to practice

Q Wang, K Ren, G Li, C Xia, X Chen, Z Wang… - Proceedings of the 22Nd …, 2015 - dl.acm.org
Physical layer (PHY) security has aroused great research interest in recent years, exploiting
physical uncertainty of wireless channels to provide communication secrecy without placing …

Secure on-off transmission design with channel estimation errors

B He, X Zhou - IEEE Transactions on Information Forensics …, 2013 - ieeexplore.ieee.org
Physical layer security has recently been regarded as an emerging technique to
complement and improve the communication security in future wireless networks. The …

Randomized convolutional codes for the wiretap channel

A Nooraiepour, TM Duman - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
We study application of convolutional codes to the randomized encoding scheme introduced
by Wyner as a way of confusing the eavesdropper over a wiretap channel. We describe …

Comparison of equivocation rate of finite-length codes for the wiretap channel

A Wickramasooriya, I Land… - SCC 2013; 9th …, 2013 - ieeexplore.ieee.org
This paper addresses the analysis of binary linear codes for the wiretap channel with focus
on binary erasure channels. We use a novel approach to measure the equivocation rate by …

On the individual secrecy capacity regions of the general, degraded, and gaussian multi-receiver wiretap broadcast channel

AS Mansour, RF Schaefer… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In this paper, secure communication over a broadcast channel with multiple legitimate
receivers and an external eavesdropper is investigated. Two different secrecy measures are …

Exact equivocation expressions for wiretap coding over erasure channel models

WK Harrison - IEEE Communications Letters, 2020 - ieeexplore.ieee.org
Traditional security analysis of wiretap codes requires evaluation of equivocation in the
asymptote as the code blocklength tends to infinity. Finite blocklength codes, however …

Exploiting partial channel state information for secrecy over wireless channels

MR Bloch, JN Laneman - IEEE Journal on Selected Areas in …, 2013 - ieeexplore.ieee.org
In this paper, we investigate the effect of partial channel state information on the achievable
secure communication rates and secret-key generation rates over ergodic fading channels …

Testbed implementation and evaluation of interleaved and scrambled coding for physical-layer security

C Martins, T Fernandes, M Gomes… - 2018 IEEE 87th …, 2018 - ieeexplore.ieee.org
This paper presents a testbed implementation and evaluation of coding for secrecy schemes
in a real environment through software defined radio platforms. These coding schemes rely …

The MIMO wiretap channel decomposed

A Khina, Y Kochman, A Khisti - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The problem of sending a secret message over the Gaussian multiple-input multiple-output
(MIMO) wiretap channel is studied. While the capacity of this channel is known, it is not clear …

Bounds on the secrecy outage probability for dependent fading channels

KL Besser, EA Jorswieck - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The amount of sensitive data, which is transmitted wirelessly will increase with future
technologies. This raises many questions about secure data transmission. Besides …